Skip to main content

CVE-2025-6044: Files or Directories Accessible to External Parties in Google ChromeOS

High
VulnerabilityCVE-2025-6044cvecve-2025-6044
Published: Mon Jul 07 2025 (07/07/2025, 18:58:45 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: ChromeOS

Description

An Improper Access Control vulnerability in the Stylus Tools component of Google ChromeOS version 16238.64.0 on Lenovo devices allows a physical attacker to bypass the lock screen and access user files by removing the stylus while the device is closed and using the screen capture feature.

AI-Powered Analysis

AILast updated: 07/07/2025, 19:24:28 UTC

Technical Analysis

CVE-2025-6044 is an Improper Access Control vulnerability identified in the Stylus Tools component of Google ChromeOS version 16238.64.0, specifically affecting Lenovo devices. The vulnerability allows a physical attacker to bypass the lock screen and gain unauthorized access to user files. The attack vector involves removing the stylus from the device while it is closed and then exploiting the screen capture feature to access files or directories that should be protected by the lock screen. This indicates a flaw in how the Stylus Tools component manages access permissions and session states when the device transitions from a locked to an unlocked state triggered by stylus removal. Since the exploit requires physical access and interaction with the device, it targets scenarios where an attacker can briefly handle the device without the user’s knowledge. The lack of a CVSS score suggests this vulnerability is newly disclosed and not yet fully assessed. The vulnerability is specific to ChromeOS on Lenovo hardware running the affected version, highlighting a hardware-software interaction issue. No known exploits are reported in the wild, but the potential for sensitive data exposure through bypassing lock screen protections is significant.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in environments where ChromeOS devices, particularly Lenovo models, are used and where physical security controls may be insufficient. The ability to bypass the lock screen and access user files can lead to unauthorized disclosure of sensitive corporate data, intellectual property, or personal information. This could undermine confidentiality and potentially integrity if attackers modify files. The attack requires physical access, so the threat is higher in shared or public spaces, or in scenarios where devices are left unattended. For sectors such as government, finance, healthcare, and critical infrastructure in Europe, where data protection regulations like GDPR impose strict requirements, such unauthorized access could result in compliance violations and reputational damage. Additionally, the vulnerability could be exploited in targeted espionage or insider threat scenarios. The absence of known exploits reduces immediate risk but does not eliminate the potential impact if weaponized.

Mitigation Recommendations

Organizations should prioritize updating ChromeOS devices to versions beyond 16238.64.0 once patches become available from Google. Until a patch is released, physical security measures must be enhanced to prevent unauthorized access to devices, including strict policies on device handling and storage. Disabling or restricting the use of the stylus and related Stylus Tools features on vulnerable devices can reduce attack surface. Administrators should audit device configurations to ensure screen capture features are disabled or limited when the device is locked. User training to avoid leaving devices unattended and to report lost or stolen devices promptly is critical. Implementing endpoint encryption and multi-factor authentication can provide additional layers of protection, although this vulnerability bypasses lock screen controls, so encryption of sensitive files is essential. Monitoring for unusual device activity and access attempts can help detect exploitation attempts. Finally, organizations should maintain an inventory of affected devices and plan for rapid remediation once official patches are released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ChromeOS
Date Reserved
2025-06-12T21:41:59.445Z
Cvss Version
null
State
PUBLISHED

Threat ID: 686c1b656f40f0eb72ec2c9b

Added to database: 7/7/2025, 7:09:25 PM

Last enriched: 7/7/2025, 7:24:28 PM

Last updated: 7/7/2025, 8:20:52 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats